Analysis

  • max time kernel
    118s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 19:47

General

  • Target

    280c0b36b6fa306389e7873dadf56eb45437c8a208640ff36d61a3e271c94ef7.exe

  • Size

    730KB

  • MD5

    78fc660b1b04227c15f484fa6d7ccec9

  • SHA1

    03f819c02a27cd288cef5271f5641e4202ce8c68

  • SHA256

    280c0b36b6fa306389e7873dadf56eb45437c8a208640ff36d61a3e271c94ef7

  • SHA512

    65f6baa2250a3557cd009fb5fabaf48b410acf7bd3ddade6e56aee4997d7f5d4db019134ec8538a2bb7c593d324f37693dfa075ed50d021c9df6e5eb1a392603

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\280c0b36b6fa306389e7873dadf56eb45437c8a208640ff36d61a3e271c94ef7.exe
    "C:\Users\Admin\AppData\Local\Temp\280c0b36b6fa306389e7873dadf56eb45437c8a208640ff36d61a3e271c94ef7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads